The Latest in IT Security

Posts Tagged ‘jungle’

Well, yes, that title is quoting a song by John D. Loudermilk, written with some (possibly accidental) prescience way back in 1962. Given the aggravation that 21st century phishing causes Google users, perhaps it's time for a new song dedicated to that particular pastime. In the meantime, I thought I'd mention a shoal of the wretched things […]

Read more ...

Our friends at Sophos has found what we consider as, probably, the first crime ever targeting Google+: fake pharma spam. Due to the high demand of G+ invites being thrown at Google, to the point that the company actually had to cease the invitation process for the beta release of their fledgling social networking site, it […]

Read more ...


FRIDAY, APRIL 19, 2024

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments